/mcuboot-3.4.0/ci/fih_test_docker/ |
D | utils.py | 45 test_stats.update([CATEGORIES['TOTAL']]) 48 test_stats.update([CATEGORIES['SUCCESS']]) 52 test_stats.update([CATEGORIES['ADDRES_NOEXEC']]) 56 test_stats.update([CATEGORIES['BOOT']]) 59 failed_boot_last_lines.update([test["last_line"]]) 61 exec_fail_reasons.update([test["test_exec_fail_reason"]])
|
/mcuboot-3.4.0/ext/tinycrypt/lib/source/ |
D | hmac_prng.c | 78 static void update(TCHmacPrng_t prng, const uint8_t *e, unsigned int len) in update() function 128 /* update assumes SOME key has been configured into HMAC */ in tc_hmac_prng_init() 130 update(prng, personalization, plen); in tc_hmac_prng_init() 162 /* call update for the seed and additional_input */ in tc_hmac_prng_reseed() 163 update(prng, seed, seedlen); in tc_hmac_prng_reseed() 164 update(prng, additional_input, additionallen); in tc_hmac_prng_reseed() 167 /* call update only for the seed */ in tc_hmac_prng_reseed() 168 update(prng, seed, seedlen); in tc_hmac_prng_reseed() 209 update(prng, prng->v, TC_SHA256_DIGEST_SIZE); in tc_hmac_prng_generate()
|
D | ctr_mode.c | 80 /* update the output */ in tc_ctr_mode() 86 /* update the counter */ in tc_ctr_mode()
|
/mcuboot-3.4.0/boot/bootutil/include/bootutil/ |
D | boot_hooks.h | 87 /** Hook for implement image update 89 * This hook is for for implementing an alternative mechanism of image update or 96 * @retval 0: update was done, skip performing the update 117 * Update will be undone so might be resume on the next boot.
|
/mcuboot-3.4.0/docs/ |
D | readme-nuttx.md | 25 …update agent, which is an important component of a secure firmware update subsystem. Through MCUbo… 27 …rmware image from a webserver, installing it and triggering the firmware update process for the ne…
|
D | readme-espressif.md | 26 2. Update the submodules needed by the Espressif port. This may take a while. 28 git submodule update --init --recursive --checkout boot/espressif/hal/esp-idf 33 git submodule update --init --recursive ext/mbedtls 144 …verify and compare the new image version number with the current one before perform an update swap. 150 …om version number. This allows image downgrade at some extent, since any update must have greater … 156 E.g.: if the current image was signed using `-s 1` parameter, an eventual update image must have be… 360 *When on **RELEASE MODE**, **ENSURE** that the application with an update agent is flashed before r… 462 …e.g. if pre-encrypted data is sent for an OTA update, it would be wrongly double-encrypted when th… 489 …*, therefore the bootloader is aware of the second image regions and can update it, however it doe… 501 # Notice that the OS layer and update agent must be aware [all …]
|
D | readme-mbed.md | 39 …firmed()` after an update, or set a new image in the secondary slot as pending with `boot_set_pend…
|
D | Gemfile | 13 # uncomment the line below. To upgrade, run `bundle update github-pages`.
|
D | readme-mynewt.md | 21 Then update your app's `pkg.yml` adding the extra dependency:
|
D | release-notes.md | 211 image update strategy is used) 235 - Update imgtool.py to support the new features 260 should land in 1.4.0. This includes a simulator update for testing 386 future release of MCUboot will update the Tinycrypt version.
|
/mcuboot-3.4.0/boot/zephyr/ |
D | Kconfig.serial_recovery | 17 If y, enables a serial-port based update mode. This allows 18 MCUboot itself to load update images into flash over a UART. 53 respect the "image" field in mcumgr image update frame
|
/mcuboot-3.4.0/boot/boot_serial/src/ |
D | boot_serial_priv.h | 82 * parameter of the mcumgr update frame. 85 * mcumgr update frame to be translated.
|
/mcuboot-3.4.0/scripts/imgtool/keys/ |
D | ed25519_test.py | 86 sha.update(buf) 96 sha.update(b'This is thE message')
|
/mcuboot-3.4.0/scripts/imgtool/ |
D | image.py | 303 cipherkey = encryptor.update(plainkey) + encryptor.finalize() 306 mac.update(cipherkey) 336 sha.update(pub) 343 sha.update(pub) 454 sha.update(self.payload) 529 encryptor.update(img) + encryptor.finalize() 654 sha.update(b[:prot_tlv_size])
|
/mcuboot-3.4.0/boot/cypress/BlinkyApp/ |
D | main.c | 70 #define WATCHDOG_UPD_MESSAGE "[BlinkyApp] Update watchdog timer started in MCUBootApp to mark succ… 121 /* Update watchdog timer to mark successful start up of application */ in main()
|
/mcuboot-3.4.0/boot/bootutil/include/bootutil/crypto/ |
D | common.h | 10 /* TODO May need to update this in a future 3.x version of Mbed TLS.
|
/mcuboot-3.4.0/boot/espressif/port/esp32/ |
D | bootloader-multi.conf | 9 # Notice that the OS layer and update agent must be aware
|
/mcuboot-3.4.0/boot/zephyr/include/ |
D | mcuboot-mbedtls-cfg.h | 20 * If you put any "generic" definitions in here, make sure to update
|
/mcuboot-3.4.0/boot/espressif/port/esp32s3/ |
D | bootloader-multi.conf | 10 # Notice that the OS layer and update agent must be aware
|
/mcuboot-3.4.0/boot/mbed/include/flash_map_backend/ |
D | secondary_bd.h | 31 * @retval secondary_bd Secondary BlockDevice where update candidates are stored
|
/mcuboot-3.4.0/boot/mbed/ |
D | mbed_lib.json | 61 …r code path, which only supports overwriting the existing image with the update image, is also ava… 180 "help": "Enable ability to boot update candidates in-place.",
|
/mcuboot-3.4.0/ci/fih_test_docker/docker-build/ |
D | Dockerfile | 18 RUN apt-get update && \
|
/mcuboot-3.4.0/boot/cypress/platforms/ |
D | cycfg_system.c | 244 /* Set worst case memory wait states (! ultra low power, 150 MHz), will update at the end */ in init_cycfg_system() 250 #warning Power system will not be configured. Update power personality to v1.20 or later. in init_cycfg_system() 523 /* Update System Core Clock values for correct Cy_SysLib_Delay functioning */ in init_cycfg_system()
|
/mcuboot-3.4.0/sim/ |
D | README.rst | 25 $ git submodule update --init --recursive
|
/mcuboot-3.4.0/boot/bootutil/src/ |
D | loader.c | 300 /* Figure out what size to write update status update as. The size depends in boot_write_sz() 848 * counter to update. 1199 /* Update the stored security counter with the new image's security counter in boot_copy_image() 1207 BOOT_LOG_ERR("Security counter update failed after image upgrade."); in boot_copy_image() 1501 * TLV area are all satisfied and update the related swap type if necessary. 1542 * Performs a clean (not aborted) image update. 1560 /* Check if the image update was triggered by a bad image in the in boot_perform_update() 1592 /* Update the stored security counter with the new image's security in boot_perform_update() 1606 BOOT_LOG_ERR("Security counter update failed after " in boot_perform_update() 1912 /* Update the stored security counter with the active image's security [all …]
|